@aws-sdk/client-kms 3.218.0 → 3.220.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +12 -11
- package/dist-cjs/endpoint/ruleset.js +1 -1
- package/dist-cjs/models/models_0.js +206 -3
- package/dist-cjs/protocols/Aws_json1_1.js +284 -0
- package/dist-es/endpoint/ruleset.js +1 -1
- package/dist-es/models/models_0.js +187 -0
- package/dist-es/protocols/Aws_json1_1.js +285 -1
- package/dist-types/KMS.d.ts +457 -312
- package/dist-types/KMSClient.d.ts +12 -11
- package/dist-types/commands/CancelKeyDeletionCommand.d.ts +1 -2
- package/dist-types/commands/ConnectCustomKeyStoreCommand.d.ts +43 -17
- package/dist-types/commands/CreateAliasCommand.d.ts +1 -1
- package/dist-types/commands/CreateCustomKeyStoreCommand.d.ts +51 -13
- package/dist-types/commands/CreateGrantCommand.d.ts +1 -2
- package/dist-types/commands/CreateKeyCommand.d.ts +76 -35
- package/dist-types/commands/DecryptCommand.d.ts +16 -17
- package/dist-types/commands/DeleteAliasCommand.d.ts +1 -1
- package/dist-types/commands/DeleteCustomKeyStoreCommand.d.ts +21 -16
- package/dist-types/commands/DescribeCustomKeyStoresCommand.d.ts +22 -17
- package/dist-types/commands/DescribeKeyCommand.d.ts +7 -3
- package/dist-types/commands/DisableKeyCommand.d.ts +3 -2
- package/dist-types/commands/DisableKeyRotationCommand.d.ts +4 -6
- package/dist-types/commands/DisconnectCustomKeyStoreCommand.d.ts +12 -12
- package/dist-types/commands/EnableKeyCommand.d.ts +1 -2
- package/dist-types/commands/EnableKeyRotationCommand.d.ts +6 -8
- package/dist-types/commands/EncryptCommand.d.ts +11 -9
- package/dist-types/commands/GenerateDataKeyCommand.d.ts +1 -2
- package/dist-types/commands/GenerateDataKeyPairCommand.d.ts +8 -10
- package/dist-types/commands/GenerateDataKeyPairWithoutPlaintextCommand.d.ts +4 -6
- package/dist-types/commands/GenerateDataKeyWithoutPlaintextCommand.d.ts +9 -2
- package/dist-types/commands/GenerateMacCommand.d.ts +14 -14
- package/dist-types/commands/GenerateRandomCommand.d.ts +6 -3
- package/dist-types/commands/GetKeyRotationStatusCommand.d.ts +3 -3
- package/dist-types/commands/GetParametersForImportCommand.d.ts +3 -3
- package/dist-types/commands/GetPublicKeyCommand.d.ts +5 -4
- package/dist-types/commands/ImportKeyMaterialCommand.d.ts +8 -8
- package/dist-types/commands/ReEncryptCommand.d.ts +5 -5
- package/dist-types/commands/ReplicateKeyCommand.d.ts +5 -4
- package/dist-types/commands/ScheduleKeyDeletionCommand.d.ts +11 -8
- package/dist-types/commands/SignCommand.d.ts +8 -6
- package/dist-types/commands/TagResourceCommand.d.ts +1 -1
- package/dist-types/commands/UntagResourceCommand.d.ts +1 -1
- package/dist-types/commands/UpdateAliasCommand.d.ts +6 -6
- package/dist-types/commands/UpdateCustomKeyStoreCommand.d.ts +58 -38
- package/dist-types/commands/UpdateKeyDescriptionCommand.d.ts +1 -2
- package/dist-types/commands/VerifyCommand.d.ts +5 -6
- package/dist-types/commands/VerifyMacCommand.d.ts +6 -6
- package/dist-types/endpoint/EndpointParameters.d.ts +1 -1
- package/dist-types/models/models_0.d.ts +925 -224
- package/dist-types/ts3.4/endpoint/EndpointParameters.d.ts +1 -1
- package/dist-types/ts3.4/models/models_0.d.ts +166 -0
- package/package.json +1 -1
|
@@ -10,8 +10,8 @@ export interface SignCommandOutput extends SignResponse, __MetadataBearer {
|
|
|
10
10
|
/**
|
|
11
11
|
* <p>Creates a <a href="https://en.wikipedia.org/wiki/Digital_signature">digital
|
|
12
12
|
* signature</a> for a message or message digest by using the private key in an asymmetric
|
|
13
|
-
* signing KMS key. To verify the signature, use the <a>Verify</a> operation, or use
|
|
14
|
-
* public key in the same asymmetric KMS key outside of KMS. For information about asymmetric KMS keys, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Asymmetric KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
13
|
+
* signing KMS key. To verify the signature, use the <a>Verify</a> operation, or use
|
|
14
|
+
* the public key in the same asymmetric KMS key outside of KMS. For information about asymmetric KMS keys, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Asymmetric KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
15
15
|
* <p>Digital signatures are generated and verified by using asymmetric key pair, such as an RSA
|
|
16
16
|
* or ECC pair that is represented by an asymmetric KMS key. The key owner (or an authorized
|
|
17
17
|
* user) uses their private key to sign a message. Anyone with the public key can verify that the
|
|
@@ -41,16 +41,18 @@ export interface SignCommandOutput extends SignResponse, __MetadataBearer {
|
|
|
41
41
|
* information is required to verify the signature.</p>
|
|
42
42
|
* </important>
|
|
43
43
|
* <note>
|
|
44
|
-
* <p>Best practices recommend that you limit the time during which any signature is
|
|
45
|
-
*
|
|
46
|
-
*
|
|
44
|
+
* <p>Best practices recommend that you limit the time during which any signature is
|
|
45
|
+
* effective. This deters an attack where the actor uses a signed message to establish validity
|
|
46
|
+
* repeatedly or long after the message is superseded. Signatures do not include a timestamp,
|
|
47
|
+
* but you can include a timestamp in the signed message to help you detect when its time to
|
|
48
|
+
* refresh the signature. </p>
|
|
47
49
|
* </note>
|
|
48
50
|
* <p>To verify the signature that this operation generates, use the <a>Verify</a>
|
|
49
51
|
* operation. Or use the <a>GetPublicKey</a> operation to download the public key and
|
|
50
52
|
* then use the public key to verify the signature outside of KMS. </p>
|
|
51
53
|
* <p>The KMS key that you use for this operation must be in a compatible key state. For
|
|
52
54
|
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
53
|
-
*
|
|
55
|
+
* <p>
|
|
54
56
|
* <b>Cross-account use</b>: Yes. To perform this operation with a KMS key in a different Amazon Web Services account, specify
|
|
55
57
|
* the key ARN or alias ARN in the value of the <code>KeyId</code> parameter.</p>
|
|
56
58
|
*
|
|
@@ -10,7 +10,7 @@ export interface TagResourceCommandOutput extends __MetadataBearer {
|
|
|
10
10
|
/**
|
|
11
11
|
* <p>Adds or edits tags on a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk">customer managed key</a>.</p>
|
|
12
12
|
* <note>
|
|
13
|
-
* <p>Tagging or untagging a KMS key can allow or deny permission to the KMS key. For details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/abac.html">ABAC
|
|
13
|
+
* <p>Tagging or untagging a KMS key can allow or deny permission to the KMS key. For details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/abac.html">ABAC for KMS</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
14
14
|
* </note>
|
|
15
15
|
* <p>Each tag consists of a tag key and a tag value, both of which are case-sensitive strings.
|
|
16
16
|
* The tag value can be an empty (null) string. To add a tag, specify a new tag key and a tag
|
|
@@ -11,7 +11,7 @@ export interface UntagResourceCommandOutput extends __MetadataBearer {
|
|
|
11
11
|
* <p>Deletes tags from a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk">customer managed key</a>. To delete a tag,
|
|
12
12
|
* specify the tag key and the KMS key.</p>
|
|
13
13
|
* <note>
|
|
14
|
-
* <p>Tagging or untagging a KMS key can allow or deny permission to the KMS key. For details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/abac.html">ABAC
|
|
14
|
+
* <p>Tagging or untagging a KMS key can allow or deny permission to the KMS key. For details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/abac.html">ABAC for KMS</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
15
15
|
* </note>
|
|
16
16
|
* <p>When it succeeds, the <code>UntagResource</code> operation doesn't return any output.
|
|
17
17
|
* Also, if the specified tag key isn't found on the KMS key, it doesn't throw an exception or
|
|
@@ -12,12 +12,12 @@ export interface UpdateAliasCommandOutput extends __MetadataBearer {
|
|
|
12
12
|
* only one KMS key at a time, although a KMS key can have multiple aliases. The alias and the
|
|
13
13
|
* KMS key must be in the same Amazon Web Services account and Region.</p>
|
|
14
14
|
* <note>
|
|
15
|
-
* <p>Adding, deleting, or updating an alias can allow or deny permission to the KMS key. For details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/abac.html">ABAC
|
|
15
|
+
* <p>Adding, deleting, or updating an alias can allow or deny permission to the KMS key. For details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/abac.html">ABAC for KMS</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
16
16
|
* </note>
|
|
17
|
-
* <p>The current and new KMS key must be the same type (both symmetric or both asymmetric
|
|
18
|
-
* they must have the same key usage
|
|
19
|
-
*
|
|
20
|
-
*
|
|
17
|
+
* <p>The current and new KMS key must be the same type (both symmetric or both asymmetric or
|
|
18
|
+
* both HMAC), and they must have the same key usage. This restriction prevents errors in code
|
|
19
|
+
* that uses aliases. If you must assign an alias to a different type of KMS key, use <a>DeleteAlias</a> to delete the old alias and <a>CreateAlias</a> to create
|
|
20
|
+
* a new alias.</p>
|
|
21
21
|
* <p>You cannot use <code>UpdateAlias</code> to change an alias name. To change an alias name,
|
|
22
22
|
* use <a>DeleteAlias</a> to delete the old alias and <a>CreateAlias</a> to
|
|
23
23
|
* create a new alias.</p>
|
|
@@ -27,7 +27,7 @@ export interface UpdateAliasCommandOutput extends __MetadataBearer {
|
|
|
27
27
|
* in the account, use the <a>ListAliases</a> operation. </p>
|
|
28
28
|
* <p>The KMS key that you use for this operation must be in a compatible key state. For
|
|
29
29
|
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
30
|
-
*
|
|
30
|
+
* <p>
|
|
31
31
|
* <b>Cross-account use</b>: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. </p>
|
|
32
32
|
* <p>
|
|
33
33
|
* <b>Required permissions</b>
|
|
@@ -8,47 +8,67 @@ export interface UpdateCustomKeyStoreCommandInput extends UpdateCustomKeyStoreRe
|
|
|
8
8
|
export interface UpdateCustomKeyStoreCommandOutput extends UpdateCustomKeyStoreResponse, __MetadataBearer {
|
|
9
9
|
}
|
|
10
10
|
/**
|
|
11
|
-
* <p>Changes the properties of a custom key store.
|
|
12
|
-
*
|
|
13
|
-
*
|
|
14
|
-
*
|
|
15
|
-
*
|
|
16
|
-
*
|
|
17
|
-
*
|
|
18
|
-
*
|
|
19
|
-
* <
|
|
20
|
-
*
|
|
21
|
-
*
|
|
22
|
-
*
|
|
23
|
-
*
|
|
24
|
-
*
|
|
25
|
-
*
|
|
26
|
-
*
|
|
27
|
-
*
|
|
28
|
-
*
|
|
29
|
-
* <
|
|
30
|
-
*
|
|
31
|
-
*
|
|
32
|
-
*
|
|
33
|
-
*
|
|
34
|
-
*
|
|
35
|
-
*
|
|
36
|
-
*
|
|
37
|
-
*
|
|
38
|
-
*
|
|
39
|
-
*
|
|
40
|
-
*
|
|
41
|
-
*
|
|
42
|
-
*
|
|
43
|
-
*
|
|
11
|
+
* <p>Changes the properties of a custom key store. You can use this operation to change the
|
|
12
|
+
* properties of an CloudHSM key store or an external key store.</p>
|
|
13
|
+
* <p>Use the required <code>CustomKeyStoreId</code> parameter to identify the custom key store.
|
|
14
|
+
* Use the remaining optional parameters to change its properties. This operation does not return
|
|
15
|
+
* any property values. To verify the updated property values, use the <a>DescribeCustomKeyStores</a> operation.</p>
|
|
16
|
+
* <p> This operation is part of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key stores</a> feature in KMS, which
|
|
17
|
+
* combines the convenience and extensive integration of KMS with the isolation and control of a
|
|
18
|
+
* key store that you own and manage.</p>
|
|
19
|
+
* <important>
|
|
20
|
+
* <p>When updating the properties of an external key store, verify that the updated settings
|
|
21
|
+
* connect your key store, via the external key store proxy, to the same external key manager
|
|
22
|
+
* as the previous settings, or to a backup or snapshot of the external key manager with the
|
|
23
|
+
* same cryptographic keys. If the updated connection settings fail, you can fix them and
|
|
24
|
+
* retry, although an extended delay might disrupt Amazon Web Services services. However, if KMS
|
|
25
|
+
* permanently loses its access to cryptographic keys, ciphertext encrypted under those keys is
|
|
26
|
+
* unrecoverable.</p>
|
|
27
|
+
* </important>
|
|
28
|
+
* <note>
|
|
29
|
+
* <p>For external key stores:</p>
|
|
30
|
+
* <p>Some external key managers provide a simpler method for updating an external key store.
|
|
31
|
+
* For details, see your external key manager documentation.</p>
|
|
32
|
+
* <p>When updating an external key store in the KMS console, you can upload a JSON-based
|
|
33
|
+
* proxy configuration file with the desired values. You cannot upload the proxy configuration
|
|
34
|
+
* file to the <code>UpdateCustomKeyStore</code> operation. However, you can use the file to
|
|
35
|
+
* help you determine the correct values for the <code>UpdateCustomKeyStore</code>
|
|
36
|
+
* parameters.</p>
|
|
37
|
+
* </note>
|
|
38
|
+
* <p>For an CloudHSM key store, you can use this operation to change the custom key store friendly
|
|
39
|
+
* name (<code>NewCustomKeyStoreName</code>), to tell KMS about a change to the
|
|
40
|
+
* <code>kmsuser</code> crypto user password (<code>KeyStorePassword</code>), or to associate
|
|
41
|
+
* the custom key store with a different, but related, CloudHSM cluster
|
|
42
|
+
* (<code>CloudHsmClusterId</code>). To update any property of an CloudHSM key store, the
|
|
43
|
+
* <code>ConnectionState</code> of the CloudHSM key store must be <code>DISCONNECTED</code>. </p>
|
|
44
|
+
* <p>For an external key store, you can use this operation to change the custom key store
|
|
45
|
+
* friendly name (<code>NewCustomKeyStoreName</code>), or to tell KMS about a change to the
|
|
46
|
+
* external key store proxy authentication credentials
|
|
47
|
+
* (<code>XksProxyAuthenticationCredential</code>), connection method
|
|
48
|
+
* (<code>XksProxyConnectivity</code>), external proxy endpoint
|
|
49
|
+
* (<code>XksProxyUriEndpoint</code>) and path (<code>XksProxyUriPath</code>). For external key
|
|
50
|
+
* stores with an <code>XksProxyConnectivity</code> of <code>VPC_ENDPOINT_SERVICE</code>, you can
|
|
51
|
+
* also update the Amazon VPC endpoint service name (<code>XksProxyVpcEndpointServiceName</code>). To
|
|
52
|
+
* update most properties of an external key store, the <code>ConnectionState</code> of the
|
|
53
|
+
* external key store must be <code>DISCONNECTED</code>. However, you can update the
|
|
54
|
+
* <code>CustomKeyStoreName</code>, <code>XksProxyAuthenticationCredential</code>, and
|
|
55
|
+
* <code>XksProxyUriPath</code> of an external key store when it is in the CONNECTED or
|
|
56
|
+
* DISCONNECTED state. </p>
|
|
57
|
+
* <p>If your update requires a <code>DISCONNECTED</code> state, before using
|
|
58
|
+
* <code>UpdateCustomKeyStore</code>, use the <a>DisconnectCustomKeyStore</a>
|
|
59
|
+
* operation to disconnect the custom key store. After the <code>UpdateCustomKeyStore</code>
|
|
60
|
+
* operation completes, use the <a>ConnectCustomKeyStore</a> to reconnect the custom
|
|
61
|
+
* key store. To find the <code>ConnectionState</code> of the custom key store, use the <a>DescribeCustomKeyStores</a> operation. </p>
|
|
62
|
+
* <p>
|
|
63
|
+
* </p>
|
|
64
|
+
* <p>Before updating the custom key store, verify that the new values allow KMS to connect
|
|
65
|
+
* the custom key store to its backing key store. For example, before you change the
|
|
66
|
+
* <code>XksProxyUriPath</code> value, verify that the external key store proxy is reachable at
|
|
67
|
+
* the new path.</p>
|
|
44
68
|
* <p>If the operation succeeds, it returns a JSON object with no
|
|
45
69
|
* properties.</p>
|
|
46
|
-
* <p>This operation is part of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store feature</a> feature in KMS, which
|
|
47
|
-
* combines the convenience and extensive integration of KMS with the isolation and control of a
|
|
48
|
-
* single-tenant key store.</p>
|
|
49
70
|
* <p>
|
|
50
|
-
* <b>Cross-account
|
|
51
|
-
* use</b>: No. You cannot perform this operation on a custom key store in a different Amazon Web Services account. </p>
|
|
71
|
+
* <b>Cross-account use</b>: No. You cannot perform this operation on a custom key store in a different Amazon Web Services account.</p>
|
|
52
72
|
* <p>
|
|
53
73
|
* <b>Required permissions</b>: <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html">kms:UpdateCustomKeyStore</a> (IAM policy)</p>
|
|
54
74
|
* <p>
|
|
@@ -12,8 +12,7 @@ export interface UpdateKeyDescriptionCommandOutput extends __MetadataBearer {
|
|
|
12
12
|
* <p>The KMS key that you use for this operation must be in a compatible key state. For
|
|
13
13
|
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
14
14
|
* <p>
|
|
15
|
-
* <b>Cross-account
|
|
16
|
-
* use</b>: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. </p>
|
|
15
|
+
* <b>Cross-account use</b>: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. </p>
|
|
17
16
|
*
|
|
18
17
|
* <p>
|
|
19
18
|
* <b>Required permissions</b>: <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html">kms:UpdateKeyDescription</a> (key policy)</p>
|
|
@@ -23,21 +23,20 @@ export interface VerifyCommandOutput extends VerifyResponse, __MetadataBearer {
|
|
|
23
23
|
* signature.</p>
|
|
24
24
|
* <p>You can also verify the digital signature by using the public key of the KMS key outside
|
|
25
25
|
* of KMS. Use the <a>GetPublicKey</a> operation to download the public key in the
|
|
26
|
-
* asymmetric KMS key and then use the public key to verify the signature outside of KMS.
|
|
27
|
-
* verify a signature outside of KMS with an SM2 public key, you must specify the distinguishing
|
|
28
|
-
* ID. By default, KMS uses <code>1234567812345678</code> as the distinguishing ID. For more
|
|
29
|
-
* information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/asymmetric-key-specs.html#key-spec-sm-offline-verification">Offline
|
|
30
|
-
* verification with SM2 key pairs</a> in <i>Key Management Service Developer Guide</i>. The
|
|
26
|
+
* asymmetric KMS key and then use the public key to verify the signature outside of KMS. The
|
|
31
27
|
* advantage of using the <code>Verify</code> operation is that it is performed within KMS. As
|
|
32
28
|
* a result, it's easy to call, the operation is performed within the FIPS boundary, it is logged
|
|
33
29
|
* in CloudTrail, and you can use key policy and IAM policy to determine who is authorized to use
|
|
34
30
|
* the KMS key to verify signatures.</p>
|
|
31
|
+
* <p>To verify a signature outside of KMS with an SM2 public key (China Regions only), you must
|
|
32
|
+
* specify the distinguishing ID. By default, KMS uses <code>1234567812345678</code> as the
|
|
33
|
+
* distinguishing ID. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/asymmetric-key-specs.html#key-spec-sm-offline-verification">Offline verification
|
|
34
|
+
* with SM2 key pairs</a>.</p>
|
|
35
35
|
* <p>The KMS key that you use for this operation must be in a compatible key state. For
|
|
36
36
|
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
37
37
|
* <p>
|
|
38
38
|
* <b>Cross-account use</b>: Yes. To perform this operation with a KMS key in a different Amazon Web Services account, specify
|
|
39
39
|
* the key ARN or alias ARN in the value of the <code>KeyId</code> parameter. </p>
|
|
40
|
-
*
|
|
41
40
|
* <p>
|
|
42
41
|
* <b>Required permissions</b>: <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html">kms:Verify</a> (key policy)</p>
|
|
43
42
|
* <p>
|
|
@@ -12,13 +12,13 @@ export interface VerifyMacCommandOutput extends VerifyMacResponse, __MetadataBea
|
|
|
12
12
|
* KMS key, and MAC algorithm. To verify the HMAC, <code>VerifyMac</code> computes an HMAC using
|
|
13
13
|
* the message, HMAC KMS key, and MAC algorithm that you specify, and compares the computed HMAC
|
|
14
14
|
* to the HMAC that you specify. If the HMACs are identical, the verification succeeds;
|
|
15
|
-
* otherwise, it fails
|
|
16
|
-
*
|
|
17
|
-
* <p>
|
|
18
|
-
*
|
|
15
|
+
* otherwise, it fails. Verification indicates that the message hasn't changed since the HMAC was
|
|
16
|
+
* calculated, and the specified key was used to generate and verify the HMAC.</p>
|
|
17
|
+
* <p>HMAC KMS keys and the HMAC algorithms that KMS uses conform to industry standards
|
|
18
|
+
* defined in <a href="https://datatracker.ietf.org/doc/html/rfc2104">RFC 2104</a>.</p>
|
|
19
19
|
* <p>This operation is part of KMS support for HMAC KMS keys. For details, see
|
|
20
|
-
*
|
|
21
|
-
*
|
|
20
|
+
* <a href="https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html">HMAC keys in KMS</a> in the
|
|
21
|
+
* <i>Key Management Service Developer Guide</i>.</p>
|
|
22
22
|
* <p>The KMS key that you use for this operation must be in a compatible key state. For
|
|
23
23
|
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
24
24
|
* <p>
|
|
@@ -12,7 +12,7 @@ export declare const resolveClientEndpointParameters: <T>(options: T & ClientInp
|
|
|
12
12
|
defaultSigningName: string;
|
|
13
13
|
};
|
|
14
14
|
export interface EndpointParameters extends __EndpointParameters {
|
|
15
|
-
Region
|
|
15
|
+
Region: string;
|
|
16
16
|
UseDualStack?: boolean;
|
|
17
17
|
UseFIPS?: boolean;
|
|
18
18
|
Endpoint?: string;
|